Chapter 21 – Malicious Code and Application Attacks Flashcards
1
Q
- What is the most commonly used technique to protect against virus attacks?
Signature detection
A
Signature detection
2
Q
- You are the security administrator for an e-commerce company and are placing a new web server into production. What network zone should you use?
DMZ
A
DMZ
3
Q
- Which one of the following types of attacks relies on the difference between the timing of two events?
TOCTOU
A
TOCTOU
4
Q
- Which of the following techniques is most closely associated with APT attacks?
Zero-day exploit
A
Zero-day exploit
5
Q
- What advanced virus technique modifies the malicious code of a virus on each system it infects?
Polymorphism
A
Polymorphism
6
Q
- Which one of the following tools provides a solution to the problem of users forgetting complex passwords?
LastPass
A
LastPass
7
Q
- What type of application vulnerability most directly allows an attacker to modify the contents of a system’s memory?
Buffer overflow
A
Buffer overflow
8
Q
- Which one of the following passwords is least likely to be compromised during a dictionary attack?
Fsas3alG
A
Fsas3alG
9
Q
- What technique may be used to limit the effectiveness of rainbow table attacks?
Salting
A
Salting
10
Q
- What character should always be treated carefully when encountered as user input on a web form?
‘
A
‘